All Projects → secana → Penet

secana / Penet

Licence: apache-2.0
Portable Executable (PE) library written in .Net

Projects that are alternatives of or similar to Penet

kar98k public
pwn & ctf tools for windows
Stars: ✭ 24 (-91.67%)
Mutual labels:  malware-analysis, pe
Lief
Authors
Stars: ✭ 2,730 (+847.92%)
Mutual labels:  pe, malware-analysis
rair-core
RAIR: RAdare In Rust
Stars: ✭ 63 (-78.12%)
Mutual labels:  malware-analysis
Malware Research
Code written as part of our various malware investigations
Stars: ✭ 281 (-2.43%)
Mutual labels:  malware-analysis
yara-rules
Yara rules written by me, for free use.
Stars: ✭ 13 (-95.49%)
Mutual labels:  malware-analysis
maz
Malware Analysis Zoo
Stars: ✭ 25 (-91.32%)
Mutual labels:  malware-analysis
MalwareDatabase
Malware samples for analysis, researchers, anti-virus and system protection testing.(1300+ Malware-samples!)
Stars: ✭ 21 (-92.71%)
Mutual labels:  malware-analysis
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-75.69%)
Mutual labels:  malware-analysis
Docker Cuckoo
Cuckoo Sandbox Dockerfile
Stars: ✭ 289 (+0.35%)
Mutual labels:  malware-analysis
MalScan
A Simple PE File Heuristics Scanners
Stars: ✭ 41 (-85.76%)
Mutual labels:  malware-analysis
Simpleator
Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that were added in Windows 10 Spring Update (1803), also called "Redstone 4", with additional improvements that were made in Windows 10 October Update (1809), aka "Redstone 5".
Stars: ✭ 260 (-9.72%)
Mutual labels:  malware-analysis
flare-emu
No description or website provided.
Stars: ✭ 561 (+94.79%)
Mutual labels:  malware-analysis
jitm
JITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.
Stars: ✭ 27 (-90.62%)
Mutual labels:  malware-analysis
Pepper
PE (x86) and PE+ (x64) files viewer, based on libpe.
Stars: ✭ 65 (-77.43%)
Mutual labels:  pe
Automated-Malware-Analysis-List
My personal Automated Malware Analysis Sandboxes and Services
Stars: ✭ 20 (-93.06%)
Mutual labels:  pe
Drltrace
Drltrace is a library calls tracer for Windows and Linux applications.
Stars: ✭ 282 (-2.08%)
Mutual labels:  malware-analysis
Malware-Machine-Learning
Malware Machine Learning
Stars: ✭ 26 (-90.97%)
Mutual labels:  malware-analysis
static file analysis
Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
Stars: ✭ 34 (-88.19%)
Mutual labels:  malware-analysis
MalwareHashDB
Malware hashes for open source projects.
Stars: ✭ 31 (-89.24%)
Mutual labels:  malware-analysis
Medusa
Binary instrumentation framework based on FRIDA
Stars: ✭ 258 (-10.42%)
Mutual labels:  malware-analysis

license NuGet NuGet Build Test

PeNet Logo PeNet is a parser for Windows Portable Executable headers. It completely written in C# and does not rely on any native Windows APIs. Furthermore it supports the creation of Import Hashes (ImpHash), which is a feature often used in malware analysis. You can extract Certificate Revocation List, compute different hash sums and other useful stuff for working with PE files.

Getting Started & API Reference

The API reference can be found here: PeNet Documentation & API Reference.

For an overview of PeNet or to analyze PE files go to: penet.io

Continuous Integration

The project is automatically build, tested and released with an Azure Pipeline.

To release a new version, push a tagged commit. For example:

git tag -a v2.0.0 -m 'Release version 2.0.0'
git push origin v2.0.0
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].